Authentication.
Assured.
Assured.
If you don’t know who’s authenticating, you can’t adequately defend against the risks posed by the current threat environment.
MFA plus passwords, swipe cards and PINs are not enough to protect enterprise or government environments because they don’t bind a person’s identity attributes to their biometrics – they only authenticate the token, not the person.

Authentication.
Assured.
Assured.
If you don’t know who’s authenticating, you can’t adequately defend against the risks posed by the current threat environment.
MFA plus passwords, swipe cards and PINs are not enough to protect enterprise or government environments because they don’t bind a person’s identity attributes to their biometrics – they only authenticate the token, not the person.

It starts with identity.
When it comes to securing your workplace, you need assurance that the person being granted access is who they say they are.
Strong authentication is the only option for the modern workplace and any protected environment.
This involves strict identity proofing and binds the biometric credential to relevant identity attributes, for the highest level of assurance that the user is who they say they are.
Strong authentication must start with a reliable user onboarding process to create the digital identity. This includes:
- Identity proofing to verify that the person is who they claim to be,
- Deduplication to ensure the user isn’t already onboarded, and
- Binding the person’s identity attributes to their biometric data.
What sets us apart.
After identity proofing is completed, Daltrey binds the biometric credential to relevant identity attributes to deliver strong authentication on any device, across any channel.
Single-factor authentication
Relies on something you have OR know:
Multi-factor authentication
Relies on something you have:
PLUS something you know:
Strong authentication
Relies on something you are:
PLUS:
How do you ensure the integrity of the biometric authentication?
When the first factor is an inherent factor – like a biometric credential – strong authentication also ensures:
- Robust presentation attack detection
- A configurable threshold
- Selection of the right inherent factor for the use case